Hands-on Exploitation Certification Flashcards

1
Q

What is an Open Redirects?

A

Open redirects happen when the web application takes an untrusted input and redirects a user from the web application to untrusted site or resources that will be used further for malicious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the threat level of an open redirects?

A

Low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does XSS stand for?

A

Cross site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should you be looking for to evaluate for XSS?

A

Anywhere You can inject an input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of threat is the following?

Www.meow.com/?name=<meowscript>alert(one)</meowscript>

A

XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is stored XSS?

A

Stored XSS is when the script is stored on the application database. For instance a comment section. If you are able to to set an alert as a script on there then everyone that visits would get the alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Blind XSS

A

Blind XSS is where the payload is fired on an internal system that is only accessed by employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What language are XSS payloads written in?

A

Javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What common method/function is used to test for the existence of XSS?

A

alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of XSS can achieve persistance on an app?

A

Stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of XSS do you receive no immediate feedback for whether is has worked of not?

A

Blind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In more modern Chrome browsers alert() may not work in iframe payloads. What method can you use instead?

A

print()

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Reflected XSS?

A

where the malicious script comes from the current HTTP request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DOM-based XSS?

A

where the vulnerability exists in client-side code rather than server-side code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are six things XSS can be used for?

A
  1. Impersonate or masquerade as the victim user.
  2. Carry out any action that the user is able to perform.
  3. Read any data that the user is able to access.
  4. Capture the user’s login credentials.
  5. Perform virtual defacement of the web site.
  6. Inject trojan functionality into the web site.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does CSP stand for?

A

Content Security Policy

17
Q

In Chrome Dev Tools where can you find CSP data?

A

In network it will be in one of the files that looks like a little blue document

18
Q

XSS:
How can you get around this to make the alert fire off?

A

by including “> this will close off the value tag causing the alert to fire

19
Q

What are you looking for on a web app to try CSRF?

A

It is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It allows an attacker to partly circumvent the same origin policy, which is designed to prevent different websites from interfering with each other.

20
Q

What is Cross Site Request forgery

A
21
Q
A
22
Q

XSS:
How can you escape this text area to fire off this alert?

A

By closing off the text area like so </textarea>

Since everything inside the test area is considered raw text the script wont fire

23
Q

XSS:
How can you escape this title field to fire off this alert?

A

By closing the title tag like so </title> this will close the html and fire off the alert

24
Q

XSS:
How can we insert an alert for this for that injects a style element into the header?

A

By closing off the stylle tag

25
Q

XSS:
How would we want to handle this alert we injected to cause it to fire?

A

The value we place get put into a string. to close the value we will want to start with closing the string with ‘

once we close the string we qwill want to end the variable declaration with ; once that is closed our alert will then be in order. However the program will auto add another ; so we will want to comment out the rest of the line with //

26
Q

When looking for a XSS vulnerability if you don’t see your payload come back in in the browser inspection what should you do?

A

use a tool like Burpsuite or Caido to intercept the request. Chances are its calling to an API and you can test from there.

27
Q
A